-
1
-
-
0003622514
-
-
Thousand Oaks, CA: SAGE Publications, Inc
-
Aiken, L. S., and West, G. W. 1991. Multiple Regression: Testing and Interpreting Interactions, Thousand Oaks, CA: SAGE Publications, Inc.
-
(1991)
Multiple Regression: Testing and Interpreting Interactions
-
-
Aiken, L.S.1
West, G.W.2
-
2
-
-
0016355478
-
A new look at the statistical model identification
-
Akaike, H. 1974. "A New Look at the Statistical Model Identification", IEEE Transactions on Automatic Control (19), pp. 716-723.
-
(1974)
IEEE Transactions on Automatic Control
, Issue.19
, pp. 716-723
-
-
Akaike, H.1
-
3
-
-
0001643223
-
The persistence and transfer of learning in industrial settings
-
Argote, L., Beckman, S. L., and Epple, D. 1990. "The Persistence and Transfer of Learning in Industrial Settings", Management Science (36:2), pp. 140-154.
-
(1990)
Management Science
, vol.36
, Issue.2
, pp. 140-154
-
-
Argote, L.1
Beckman, S.L.2
Epple, D.3
-
4
-
-
0025021555
-
Learning curves in manufacturing
-
Argote, L., and Epple, D. 1990. "Learning Curves in Manufacturing", Science (247:4945), pp. 920-924.
-
(1990)
Science
, vol.247
, Issue.4945
, pp. 920-924
-
-
Argote, L.1
Epple, D.2
-
5
-
-
0042218143
-
Intraorganizational learning
-
J. Baum ed., Oxford, UK: Wiley-Wiley
-
Argote, L., and Ophir, R. 2005. "Intraorganizational Learning", in The Blackwell Companion to Organizations, J. Baum (ed.), Oxford, UK: Wiley-Wiley, pp. 181-207.
-
(2005)
The Blackwell Companion to Organizations
, pp. 181-207
-
-
Argote, L.1
Ophir, R.2
-
6
-
-
33644916146
-
Sell first, fix later: Impact of patching on software quality
-
Arora, A., Caulkins, J. P., and Telang, R. 2006. "Sell First, Fix Later: Impact of Patching on Software Quality", Management Science (52:3), pp. 465-471.
-
(2006)
Management Science
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Caulkins, J.P.2
Telang, R.3
-
7
-
-
77954250852
-
An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
-
Arora, A., Krishnan, R., Telang, R., and Yang, Y. B. 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure", Information Systems Research (21:1), pp. 115-132.
-
(2010)
Information Systems Research
, vol.21
, Issue.1
, pp. 115-132
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.B.4
-
8
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
Arora, A., Telang, R., and Xu, H. 2008. "Optimal Policy for Software Vulnerability Disclosure", Management Science (54:4), pp. 642-656.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
9
-
-
84944960496
-
Best practices: Guidelines to consider in the evaluation of potentially unwanted technologies
-
ASC. 2007. "Best Practices: Guidelines to Consider in the Evaluation of Potentially Unwanted Technologies", Anti-Spyware Coalition (http://www.antispywarecoalition.org/documents/documents/best-practices-final-working-report.pdf)
-
(2007)
Anti-spyware Coalition
-
-
ASC1
-
10
-
-
84869988850
-
Information technology and organizational learning: An empirical analysis
-
Washington, DC, December 12-15
-
Ashworth, M., Mukhopadhyay, T., and Argote, L. 2004. "Information Technology and Organizational Learning: An Empirical Analysis", in Proceedings of the 25th International Conference on Information Systems, Washington, DC, December 12-15, pp. 481-492.
-
(2004)
Proceedings of the 25th International Conference on Information Systems
, pp. 481-492
-
-
Ashworth, M.1
Mukhopadhyay, T.2
Argote, L.3
-
11
-
-
33750703619
-
Network software security and user incentives
-
August, T., and Tunca, T. I. 2006. "Network Software Security and User Incentives", Management Science (52:11), pp. 1703-1720.
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
12
-
-
61349202831
-
Let the pirates patch? An economic analysis of software security patch restrictions
-
August, T., and Tunca, T. I. 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions", Information Systems Research (19:1), pp. 48-70.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 48-70
-
-
August, T.1
Tunca, T.I.2
-
13
-
-
79956063140
-
Who should be responsible for software security? A comparative analysis of liability policies in network environments
-
August, T., and Tunca, T. I. 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments", Management Science (57:5), pp. 934-959.
-
(2011)
Management Science
, vol.57
, Issue.5
, pp. 934-959
-
-
August, T.1
Tunca, T.I.2
-
14
-
-
84944960497
-
Fighting epo viruses
-
Bania, P. 2010. "Fighting Epo Viruses", Symantec Connect, (http://www.symantec.com/connect/articles/fighting-epoviruses).
-
(2010)
Symantec Connect
-
-
Bania, P.1
-
15
-
-
0032050741
-
Software development practices, software complexity, and software maintenance performance: A field study
-
Banker, R. D., Davis, G. B., and Slaughter, S. A. 1998. "Software Development Practices, Software Complexity, and Software Maintenance Performance: A Field Study", Management Science (44:4), pp. 433-450.
-
(1998)
Management Science
, vol.44
, Issue.4
, pp. 433-450
-
-
Banker, R.D.1
Davis, G.B.2
Slaughter, S.A.3
-
16
-
-
0023020183
-
The moderator mediator variable distinction in social psychological-research: Conceptual, strategic, and statistical considerations
-
Baron, R. M., and Kenny, D. A. 1986. "The Moderator Mediator Variable Distinction in Social Psychological-Research: Conceptual, Strategic, and Statistical Considerations", Journal of Personality and Social Psychology (51:6), pp. 1173-1182.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.6
, pp. 1173-1182
-
-
Baron, R.M.1
Kenny, D.A.2
-
17
-
-
61349154288
-
Aspiration performance and railroads' patterns of learning from train wrecks and crashes
-
Baum, J. A. C., and Dahlin, K. B. 2007. "Aspiration Performance and Railroads' Patterns of Learning from Train Wrecks and Crashes", Organization Science (18:3), pp. 368-385.
-
(2007)
Organization Science
, vol.18
, Issue.3
, pp. 368-385
-
-
Baum, J.A.C.1
Dahlin, K.B.2
-
18
-
-
84944960498
-
Governments hit by cyber attack
-
July 8
-
BBC. 2009. "Governments Hit by Cyber Attack", BBC News, July 8 (http://news.bbc.co.uk/2/hi/technology/8139821.stm).
-
(2009)
BBC News
-
-
BBC1
-
19
-
-
0001135843
-
Learning and forgetting: The dynamics of aircraft production
-
Benkard, C. L. 2000. "Learning and Forgetting: The Dynamics of Aircraft Production", American Economic Review (90:4), pp. 1034-1054.
-
(2000)
American Economic Review
, vol.90
, Issue.4
, pp. 1034-1054
-
-
Benkard, C.L.1
-
20
-
-
38549099676
-
Learning from experience in software development: A multilevel analysis
-
Boh, W. F., Slaughter, S. A., and Espinosa, J. A. 2007. "Learning from Experience in Software Development: A Multilevel Analysis", Management Science (53:8), pp. 1315-1331.
-
(2007)
Management Science
, vol.53
, Issue.8
, pp. 1315-1331
-
-
Boh, W.F.1
Slaughter, S.A.2
Espinosa, J.A.3
-
21
-
-
84901620904
-
Virus for hire: Growing number of hackers attack web sites for cash
-
Business Section, November 30
-
Bryan-Low, C. 2004. "Virus for Hire: Growing Number of Hackers Attack Web Sites for Cash", Wall Street Journal, Business Section, November 30, (http://online.wsj.com/article/SB110176932097886077.html).
-
(2004)
Wall Street Journal
-
-
Bryan-Low, C.1
-
22
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004. "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers", International Journal of Electronic Commerce (9:1), pp. 69-104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
23
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture", Information Systems Research (16:1), pp. 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
24
-
-
33947376004
-
Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
-
Cavusoglu, H., and Raghunathan, S. 2007. "Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge", IEEE Transactions on Software Engineering (33:3), pp. 171-185.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.3
, pp. 171-185
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
25
-
-
61849135265
-
Security patch management: Share the burden or share the damage?
-
Cavusoglu, H., and Zhang, J. 2008. "Security Patch Management: Share the Burden or Share the Damage?", Management Science (54:4), pp. 657-670.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 657-670
-
-
Cavusoglu, H.1
Zhang, J.2
-
26
-
-
84861381885
-
Broadening focus: Spillovers, complementarities, and specialization in the hospital industry
-
Clark, J. R., and Huckman, R. S. 2012. "Broadening Focus: Spillovers, Complementarities, and Specialization in the Hospital Industry", Management Science (58:4), pp. 708-722.
-
(2012)
Management Science
, vol.58
, Issue.4
, pp. 708-722
-
-
Clark, J.R.1
Huckman, R.S.2
-
28
-
-
0000323696
-
The acquisition, transfer, and depreciation of knowledge in service organizations: Productivity in franchises
-
Darr, E. D., Argote, L., and Epple, D. 1995. "The Acquisition, Transfer, and Depreciation of Knowledge in Service Organizations: Productivity in Franchises", Management Science (41:11), pp. 1750-1762.
-
(1995)
Management Science
, vol.41
, Issue.11
, pp. 1750-1762
-
-
Darr, E.D.1
Argote, L.2
Epple, D.3
-
29
-
-
84944876793
-
The evolution of antivirus software
-
Desai, C. 2007. "The Evolution of Antivirus Software", Network World (24:42), p. 30.
-
(2007)
Network World
, vol.24
, Issue.42
, pp. 30
-
-
Desai, C.1
-
30
-
-
0000068350
-
Treating progress functions as a managerial opportunity
-
Dutton, J. M., and Thomas, A. 1984. "Treating Progress Functions as a Managerial Opportunity", Academy of Management Review (9:2), pp. 235-247.
-
(1984)
Academy of Management Review
, vol.9
, Issue.2
, pp. 235-247
-
-
Dutton, J.M.1
Thomas, A.2
-
32
-
-
0005721539
-
A brief statement of schema theory
-
Evans, S. H. 1967. "A Brief Statement of Schema Theory", Psychonomic Science (8), pp. 87-88.
-
(1967)
Psychonomic Science
, Issue.8
, pp. 87-88
-
-
Evans, S.H.1
-
33
-
-
0034478781
-
Coordinating expertise in software development teams
-
Faraj, S., and Sproull, L. 2000. "Coordinating Expertise in Software Development Teams", Management Science (46:12), pp. 1554-1568.
-
(2000)
Management Science
, vol.46
, Issue.12
, pp. 1554-1568
-
-
Faraj, S.1
Sproull, L.2
-
34
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E., and Ghose, A. 2005. "The Economic Incentives for Sharing Security Information", Information Systems Research (16:2), pp. 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
35
-
-
33747415490
-
The volume-outcome effect, scale economies, and learning-by-doing
-
Gaynor, M., Seider, H., and Vogt, W. B. 2005. "The Volume-Outcome Effect, Scale Economies, and Learning-by-Doing", American Economic Review (95:2), pp. 243-247.
-
(2005)
American Economic Review
, vol.95
, Issue.2
, pp. 243-247
-
-
Gaynor, M.1
Seider, H.2
Vogt, W.B.3
-
36
-
-
0032209022
-
Process innovation and learning by doing in semiconductor manufacturing
-
Hatch, N. W., and Mowery, D. C. 1998. "Process Innovation and Learning by Doing in Semiconductor Manufacturing", Management Science (44:11), pp. 1461-1477.
-
(1998)
Management Science
, vol.44
, Issue.11
, pp. 1461-1477
-
-
Hatch, N.W.1
Mowery, D.C.2
-
38
-
-
84944960499
-
Targeted attacks 10 times more profitable than mass campaigns
-
Higgins, K. J. 2011. "Targeted Attacks 10 Times More Profitable Than Mass Campaigns", Dark Reading (http://www.darkreading.com/mobile/targeted-attacks-10-times-more-profitabl/231000836).
-
(2011)
Dark Reading
-
-
Higgins, K.J.1
-
39
-
-
80052890770
-
The organizational science of disaster/terrorism prevention and response: Theory-building toward the future of the field
-
James, K. 2011. "The Organizational Science of Disaster/Terrorism Prevention and Response: Theory-Building toward the Future of the Field", Journal of Organizational Behavior (32:7), pp. 1013-1032.
-
(2011)
Journal of Organizational Behavior
, vol.32
, Issue.7
, pp. 1013-1032
-
-
James, K.1
-
40
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., and Telang, R. 2005. "Market for Software Vulnerabilities? Think Again", Management Science (51:5), pp. 726-740.
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
42
-
-
84868234495
-
Accumulating a portfolio of experience: The effect of focal and related experience on surgeon performance
-
KC, D. S., and Staats, B. R. 2012. "Accumulating a Portfolio of Experience: The Effect of Focal and Related Experience on Surgeon Performance", Manufacturing & Service Operations Management (14:4), pp. 618-633.
-
(2012)
Manufacturing & Service Operations Management
, vol.14
, Issue.4
, pp. 618-633
-
-
Kc, D.S.1
Staats, B.R.2
-
43
-
-
72449167415
-
An economic analysis of the software market with a risk-sharing mechanism
-
Kim, B. C., Chen, P. Y., and Mukhopadhyay, T. 2009. "An Economic Analysis of the Software Market with a Risk-Sharing Mechanism", International Journal of Electronic Commerce (14:2), pp. 7-39.
-
(2009)
International Journal of Electronic Commerce
, vol.14
, Issue.2
, pp. 7-39
-
-
Kim, B.C.1
Chen, P.Y.2
Mukhopadhyay, T.3
-
44
-
-
79960144492
-
The effect of liability and patch release on software security: The monopoly case
-
Kim, B. C., Chen, P. Y., and Mukhopadhyay, T. 2011. "The Effect of Liability and Patch Release on Software Security: The Monopoly Case", Production and Operations Management (20:4), pp. 603-617.
-
(2011)
Production and Operations Management
, vol.20
, Issue.4
, pp. 603-617
-
-
Kim, B.C.1
Chen, P.Y.2
Mukhopadhyay, T.3
-
45
-
-
84863267311
-
A comparative study of cyberattacks
-
Kim, S. H., Wang, Q. H., and Ullrich, J. B. 2012. "A Comparative Study of Cyberattacks", Communications of the ACM (55:3), pp. 66-73.
-
(2012)
Communications of the ACM
, vol.55
, Issue.3
, pp. 66-73
-
-
Kim, S.H.1
Wang, Q.H.2
Ullrich, J.B.3
-
46
-
-
77049094487
-
Organizational learning from extreme performance experience: The impact of success and recovery experience
-
Kim, J. Y., and Miner, A. S. 2009. "Organizational Learning from Extreme Performance Experience: The Impact of Success and Recovery Experience", Organization Science (20:6), pp. 958-978.
-
(2009)
Organization Science
, vol.20
, Issue.6
, pp. 958-978
-
-
Kim, J.Y.1
Miner, A.S.2
-
47
-
-
84944895578
-
Understanding security knowledge and national culture: A comparative investigation between Korea and the U. S.
-
Kwak, D.-H., Kizzier, D. M., Zo, H., and Jung, E. S. 2011. "Understanding Security Knowledge and National Culture: A Comparative Investigation between Korea and the U. S.", Asia Pacific Journal of Information Systems (21:3), pp. 51-69.
-
(2011)
Asia Pacific Journal of Information Systems
, vol.21
, Issue.3
, pp. 51-69
-
-
Kwak, D.-H.1
Kizzier, D.M.2
Zo, H.3
Jung, E.S.4
-
48
-
-
77049091359
-
Experiencing the improbable: Rare events and organizational learning
-
Lampel, J., Shamsie, J., and Shapira, Z. 2009. "Experiencing the Improbable: Rare Events and Organizational Learning", Organization Science (20:5), pp. 835-845.
-
(2009)
Organization Science
, vol.20
, Issue.5
, pp. 835-845
-
-
Lampel, J.1
Shamsie, J.2
Shapira, Z.3
-
50
-
-
35548965096
-
An examination of private intermediaries' roles in software vulnerabilities disclosure
-
Li, P., and Rao, H. R. 2007. "An Examination of Private Intermediaries' Roles in Software Vulnerabilities Disclosure", Information Systems Frontiers (9:5), pp. 531-539.
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 531-539
-
-
Li, P.1
Rao, H.R.2
-
51
-
-
0033253617
-
Analogical encoding facilitates knowledge transfer in negotiation
-
Loewenstein, J., Thompson, L., and Gentner, D. 1999. "Analogical Encoding Facilitates Knowledge Transfer in Negotiation", Psychonomic Bulletin & Review (6:4), pp. 586-597.
-
(1999)
Psychonomic Bulletin & Review
, vol.6
, Issue.4
, pp. 586-597
-
-
Loewenstein, J.1
Thompson, L.2
Gentner, D.3
-
52
-
-
77049089733
-
These lives will not be lost in vain: Organizational learning from disaster in u. S. Coal mining
-
Madsen, P. M. 2009. "These Lives Will Not Be Lost in Vain: Organizational Learning from Disaster in U. S. Coal Mining", Organization Science (20:5), pp. 861-875.
-
(2009)
Organization Science
, vol.20
, Issue.5
, pp. 861-875
-
-
Madsen, P.M.1
-
53
-
-
77954022932
-
Failing to learn? The effects of failure and success on organizational learning in the global orbital launch vehicle industry
-
Madsen, P. M., and Desai, V. 2010. "Failing to Learn? The Effects of Failure and Success on Organizational Learning in the Global Orbital Launch Vehicle Industry", Academy of Management Journal (53:3), pp. 451-476.
-
(2010)
Academy of Management Journal
, vol.53
, Issue.3
, pp. 451-476
-
-
Madsen, P.M.1
Desai, V.2
-
54
-
-
77957096376
-
Moving toward black hat research in information systems security: An editorial introduction to the special issue
-
Mahmood, M. A., Siponen, M., Straub, D., Rao, H. R., and Raghu, T. S. 2010. "Moving toward Black Hat Research in Information Systems Security: An Editorial Introduction to the Special Issue", MIS Quarterly (34:3), pp. 431-433.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 431-433
-
-
Mahmood, M.A.1
Siponen, M.2
Straub, D.3
Rao, H.R.4
Raghu, T.S.5
-
55
-
-
0001812752
-
Exploration and exploitation in organizational learning
-
March, J. G. 1991. "Exploration and Exploitation in Organizational Learning", Organization Science (2:1), pp. 71-87.
-
(1991)
Organization Science
, vol.2
, Issue.1
, pp. 71-87
-
-
March, J.G.1
-
57
-
-
84902015866
-
Defying experts, rogue computer code still lurks
-
Technology Section, August 26
-
Markoff, J. 2009a. "Defying Experts, Rogue Computer Code Still Lurks", The New York Times, Technology Section, August 26 (http://www.nytimes.com/2009/08/27/technology/27compute.html).
-
(2009)
The New York Times
-
-
Markoff, J.1
-
58
-
-
84944960501
-
Malicious software is revised
-
Technology Section, April 9
-
Markoff, J. 2009b. "Malicious Software Is Revised", The New York Times, Technology Section, April 9 (http://www.nytimes.com/2009/04/10/technology/10virus.html).
-
(2009)
The New York Times
-
-
Markoff, J.1
-
59
-
-
37049185921
-
Early data: Losing our memory?
-
Marshall, E. 1989. "Early Data: Losing Our Memory?", Science (244:4910), p. 1250.
-
(1989)
Science
, vol.244
, Issue.4910
, pp. 1250
-
-
Marshall, E.1
-
60
-
-
84944960502
-
Conficker wakes up, updates via p2p, drops payload
-
April 8
-
Mills, E. 2009. "Conficker Wakes Up, Updates Via P2P, Drops Payload", CNET, April 8 (http://news.cnet.com/8301-1009-3-10215678-83.html).
-
(2009)
CNET
-
-
Mills, E.1
-
61
-
-
84944960503
-
South Korean web sites under renewed attack
-
July 8
-
NBC News. 2009. "South Korean Web Sites under Renewed Attack", NBCNEWS.com, July 8 (http://www.nbcnews.com/id/31825511/ns/technology-and-science-security/t/south-koreanweb-sites-under-renewed-attack/).
-
(2009)
NBCNEWS.com
-
-
NBC News1
-
62
-
-
84865099412
-
Learning curves of agents with diverse skills in information technology-enabled physician referral systems
-
Mukhopadhyay, T., Singh, P. V., and Kim, S. H. 2011. "Learning Curves of Agents with Diverse Skills in Information Technology-Enabled Physician Referral Systems", Information Systems Research (22:3), pp. 586-605.
-
(2011)
Information Systems Research
, vol.22
, Issue.3
, pp. 586-605
-
-
Mukhopadhyay, T.1
Singh, P.V.2
Kim, S.H.3
-
63
-
-
84944960504
-
Antivirus research and detection techniques
-
July 1
-
Munro, J. 2002. "Antivirus Research and Detection Techniques", Extreme Tech, July 1 (http://www.extremetech.com/computing/51498-antivirus-research-and-detection-techniques).
-
(2002)
Extreme Tech
-
-
Munro, J.1
-
64
-
-
73249129677
-
A matter of balance: Specialization, task variety, and individual learning in a software maintenance environment
-
Narayanan, S., Balasubramanian, S., and Swaminathan, J. M. 2009. "A Matter of Balance: Specialization, Task Variety, and Individual Learning in a Software Maintenance Environment", Management Science (55:11), pp. 1861-1876
-
(2009)
Management Science
, vol.55
, Issue.11
, pp. 1861-1876
-
-
Narayanan, S.1
Balasubramanian, S.2
Swaminathan, J.M.3
-
65
-
-
40949158432
-
An undirected attack against critical infrastructure: A case study for improving your control system security
-
Nash, T. 2005. "An Undirected Attack against Critical Infrastructure: A Case Study for Improving Your Control System Security" US-CERT Control Systems Security Center Case Study Series: Vol. 1.2 (http://ics-cert.us-cert.gov/sites/default/files/documents/CaseStudy-002.pdf).
-
(2005)
US-CERT Control Systems Security Center Case Study Series: Vol. 1.2
-
-
Nash, T.1
-
66
-
-
84944960505
-
Downadup virus exposes millions of pcs to hijack
-
January 16
-
Neild, B. 2009. "Downadup Virus Exposes Millions of PCs to Hijack", CNN.com/Technology, January 16 (http://edition. cnn.com/2009/TECH/ptech/01/16/virus.downadup/?iref= mpstoryview).
-
(2009)
CNN.com/Technology
-
-
Neild, B.1
-
67
-
-
33846588487
-
To disclose or not? An analysis of software user behavior
-
Nizovtsev, D., and Thursby, M. 2007. "To Disclose or Not? An Analysis of Software User Behavior", Information Economics and Policy (19:1), pp. 43-64.
-
(2007)
Information Economics and Policy
, vol.19
, Issue.1
, pp. 43-64
-
-
Nizovtsev, D.1
Thursby, M.2
-
68
-
-
0035381974
-
Organizational differences in rates of learning: Evidence from the adoption of minimally invasive cardiac surgery
-
Pisano, G. P., Bohmer, R. M. J., and Edmondson, A. C. 2001. "Organizational Differences in Rates of Learning: Evidence from the Adoption of Minimally Invasive Cardiac Surgery", Management Science (47:6), pp. 752-768.
-
(2001)
Management Science
, vol.47
, Issue.6
, pp. 752-768
-
-
Pisano, G.P.1
Bohmer, R.M.J.2
Edmondson, A.C.3
-
69
-
-
63349088117
-
The deterrent and displacement effects of information security enforcement: International evidence
-
Png, I. P. L., Wang, C. Y., and Wang, Q. H. 2008. "The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence", Journal of Management Information Systems (25:2), pp. 125-144.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 125-144
-
-
Png, I.P.L.1
Wang, C.Y.2
Wang, Q.H.3
-
70
-
-
84944960506
-
Top 10 tech scares of the decade
-
Purewal, S. J. 2011. "Top 10 Tech Scares of the Decade", PCWorld (http://www.pcworld.com/article/214403/top-10-tech-scares-of-the-decade.html).
-
(2011)
PCWorld
-
-
Purewal, S.J.1
-
71
-
-
33747156640
-
Changing the paradigm of software engineering
-
Rajilch, V. 2006. "Changing the Paradigm of Software Engineering", Communications of the ACM (49:8), pp. 67-70.
-
(2006)
Communications of the ACM
, vol.49
, Issue.8
, pp. 67-70
-
-
Rajilch, V.1
-
72
-
-
67649548424
-
Choice and chance: A conceptual model of paths to information security compromise
-
Ransbotham, S., and Mitra, S. 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise", Information Systems Research (20:1), pp. 121-139.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
73
-
-
84884138082
-
Are markets for vulnerabilities effective?
-
Ransbotham, S., Mitra, S., and Ramsey, J. 2012. "Are Markets for Vulnerabilities Effective?", MIS Quarterly (36:1), pp. 43-64.
-
(2012)
MIS Quarterly
, vol.36
, Issue.1
, pp. 43-64
-
-
Ransbotham, S.1
Mitra, S.2
Ramsey, J.3
-
75
-
-
0037281745
-
Learning by doing something else: Variation, relatedness, and the learning curve
-
Schilling, M. A., Vidal, P., Ployhart, R. E., and Marangoni, A. 2003. "Learning by Doing Something Else: Variation, Relatedness, and the Learning Curve", Management Science (49:1), pp. 39-56.
-
(2003)
Management Science
, vol.49
, Issue.1
, pp. 39-56
-
-
Schilling, M.A.1
Vidal, P.2
Ployhart, R.E.3
Marangoni, A.4
-
76
-
-
33750595181
-
A schema theory of discrete motor skill learning
-
Schmidt, R. A. 1975. "A Schema Theory of Discrete Motor Skill Learning", Psychological Review (82:4), pp. 225-260.
-
(1975)
Psychological Review
, vol.82
, Issue.4
, pp. 225-260
-
-
Schmidt, R.A.1
-
77
-
-
84944960507
-
Advanced malware and targeted attacks evade traditional defences and leave enterprises vulnerable to attack
-
August 31
-
SCMagazine. 2011. "Advanced Malware and Targeted Attacks Evade Traditional Defences and Leave Enterprises Vulnerable to Attack", SC Magazine, August 31 (http://www.scmagazineuk.com/advanced-malware-and-targeted-attacks-evade-traditionaldefences-and-leave-enterprises-vulnerable-to-attack/article/210924/).
-
(2011)
SC Magazine
-
-
SCMagazine1
-
79
-
-
84938068880
-
An analysis of information security management strategies in the presence of interdependent security risk
-
Shim, W. H. 2012. "An Analysis of Information Security Management Strategies in the Presence of Interdependent Security Risk", Asia Pacific Journal of Information Systems (22:1), pp. 79-101.
-
(2012)
Asia Pacific Journal of Information Systems
, vol.22
, Issue.1
, pp. 79-101
-
-
Shim, W.H.1
-
80
-
-
0013112691
-
Economies of Scale in Theory and Practice
-
Silberston, A. 1972. "Economies of Scale in Theory and Practice", The Economic Journal (82:325), pp. 369-391.
-
(1972)
The Economic Journal
, vol.82
, Issue.325
, pp. 369-391
-
-
Silberston, A.1
-
81
-
-
0003587413
-
-
Chicago: University of Chicago Press
-
Smith, A. 1776. The Wealth of Nations, Chicago: University of Chicago Press.
-
(1776)
The Wealth of Nations
-
-
Smith, A.1
-
82
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., and Welke, R. J. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making", MIS Quarterly (22:4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
84
-
-
84874000050
-
One internet, many worlds
-
® Labs (2:1), pp. 3-5.
-
(2008)
® Labs
, vol.2
, Issue.1
, pp. 3-5
-
-
Telafici, J.1
-
85
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
Telang, R., and Wattal, S. 2007. "An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price", IEEE Transactions on Software Engineering (33:8), pp. 544-557.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
86
-
-
84860651147
-
Patch release behaviors of software vendors in response to vulnerabilities: An empirical analysis
-
Temizkan, O., Kumar. R. L., Park, S., and Subramanian, C. 2012. "Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis", Journal of Management Information Systems (28:4), pp. 305-338.
-
(2012)
Journal of Management Information Systems
, vol.28
, Issue.4
, pp. 305-338
-
-
Temizkan, O.1
Kumar, R.L.2
Park, S.3
Subramanian, C.4
-
87
-
-
0009385128
-
Learning from experience and learning from others: An exploration of learning and spillovers in wartime shipbuilding
-
Thornton, R. A., and Thompson, P. 2001. "Learning from Experience and Learning from Others: An Exploration of Learning and Spillovers in Wartime Shipbuilding", American Economic Review (91:5), pp. 1350-1368.
-
(2001)
American Economic Review
, vol.91
, Issue.5
, pp. 1350-1368
-
-
Thornton, R.A.1
Thompson, P.2
-
90
-
-
0000840199
-
The distinctive domain of entrepreneurship research: An editor's perspective
-
Firm Emergence, and Growth Volume 3, J. Katz and R. Brockhaus eds., Greenwich, CT: JAI Press
-
Venkatarman, S. 1997. "The Distinctive Domain of Entrepreneurship Research: An Editor's Perspective", in Advances in Entrepreneurship, Firm Emergence, and Growth (Volume 3), J. Katz and R. Brockhaus (eds.), Greenwich, CT: JAI Press, pp. 119-138.
-
(1997)
Advances in Entrepreneurship
, pp. 119-138
-
-
Venkatarman, S.1
-
91
-
-
84944960509
-
Antivirus vendors collaborate on spyware fight
-
January 31
-
Vijayan, J. 2006. "Antivirus Vendors Collaborate on Spyware Fight", PCWorld, January 31 (http://www.pcworld.com/article/124564/article.html).
-
(2006)
PCWorld
-
-
Vijayan, J.1
-
92
-
-
84944960510
-
Targeted malware attack on foreign correspondents based in China
-
September 28
-
Villeneuve, N., and Walton, G. 2009. "Targeted Malware Attack on Foreign Correspondents Based in China", Infowar Monitor, September 28 (http://www.infowar-monitor.net/2009/09/targetedmalware-attack-on-foreign-correspondents-based-in-china).
-
(2009)
Infowar Monitor
-
-
Villeneuve, N.1
Walton, G.2
-
93
-
-
0032071638
-
Economics of product development by users: The impact of "sticky" local information
-
Von Hippel, E. 1998. "Economics of Product Development by Users: The Impact of "Sticky" Local Information", Management Science (44:5), pp. 629-644.
-
(1998)
Management Science
, vol.44
, Issue.5
, pp. 629-644
-
-
Von Hippel, E.1
-
94
-
-
84870960759
-
Cyberattacks: Does physical boundary matter?
-
Phoenix, AZ, December 15-18
-
Wang, Q. H., and Kim, S. H. 2009. "Cyberattacks: Does Physical Boundary Matter?", in Proceedings of the 30th International Conference on Information Systems, Phoenix, AZ, December 15-18.
-
(2009)
Proceedings of the 30th International Conference on Information Systems
-
-
Wang, Q.H.1
Kim, S.H.2
-
95
-
-
38549146488
-
Conditions that shape the learning curve: Factors that increase the ability and opportunity to learn
-
Wiersma, E. 2007. "Conditions That Shape the Learning Curve: Factors That Increase the Ability and Opportunity to Learn", Management Science (53:12), pp. 1903-1915.
-
(2007)
Management Science
, vol.53
, Issue.12
, pp. 1903-1915
-
-
Wiersma, E.1
-
96
-
-
84944960512
-
Spread of slammer worm slows
-
January 27
-
Williams, M., Roberts, P., and Evers, J. 2003. "Spread of Slammer Worm Slows", PCWorld, January 27 (http://www.pcworld.com/article/108996/article.html).
-
(2003)
PCWorld
-
-
Williams, M.1
Roberts, P.2
Evers, J.3
-
97
-
-
84944960513
-
Targeted attacks now Using bredolab malware
-
February 17
-
Wood, P. 2010. "Targeted Attacks Now Using Bredolab Malware", Symantec Connect, February 17 (http://www.symantec.com/connect/blogs/targeted-attacks-now-using-bredolab-malware).
-
(2010)
Symantec Connect
-
-
Wood, P.1
-
98
-
-
80052893391
-
Responses to adversarial situations and collective intelligence
-
Woolley, A. W. 2011. "Responses to Adversarial Situations and Collective Intelligence", Journal of Organizational Behavior (32:7), pp. 978-983.
-
(2011)
Journal of Organizational Behavior
, vol.32
, Issue.7
, pp. 978-983
-
-
Woolley, A.W.1
-
99
-
-
0001250106
-
Factors affecting the cost of airplanes
-
Wright, T. P. 1936. "Factors Affecting the Cost of Airplanes", Journal of Aeronautical Sciences (3:4), pp. 122-128.
-
(1936)
Journal of Aeronautical Sciences
, vol.3
, Issue.4
, pp. 122-128
-
-
Wright, T.P.1
-
100
-
-
84944960514
-
Can foreign antivirus match Asian threats?
-
October 30
-
Yeo, V. 2008. "Can Foreign Antivirus Match Asian Threats?", ZDNet, October 30 (http://www.zdnet.com/can-foreign-antivirusmatch-asian-threats-2062047787/).
-
(2008)
ZDNet
-
-
Yeo, V.1
|